Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-50780

Опубликовано: 14 окт. 2024
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

Apache ActiveMQ Artemis allows access to diagnostic information and controls through MBeans, which are also exposed through the authenticated Jolokia endpoint. Before version 2.29.0, this also included the Log4J2 MBean. This MBean is not meant for exposure to non-administrative users. This could eventually allow an authenticated attacker to write arbitrary files to the filesystem and indirectly achieve RCE. Users are recommended to upgrade to version 2.29.0 or later, which fixes the issue.

A flaw was found in Apache ActiveMQ Artemis. Affected versions of this package allow access to diagnostic information and controls through MBeans, which are also exposed through the authenticated Jolokia endpoint. This also included the Log4J2 MBean. This MBean is not meant for exposure to non-administrative users. This issue could eventually allow an authenticated attacker to write arbitrary files to the filesystem and indirectly achieve RCE.

Отчет

This vulnerability is considered Important rather than Critical because, while it does allow an authenticated attacker to exploit exposed MBeans (such as the Log4J2 MBean) to write arbitrary files, the exploit path requires prior authentication. The attacker must have valid credentials to access the Jolokia endpoint, limiting the attack's scope to already-compromised or insider-threat scenarios. Additionally, successful exploitation requires specific conditions, such as controlling the file's content in a way that leads to code execution, which is not guaranteed.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat AMQ Broker 7org.apache.activemq/artemis-cliNot affected
Red Hat Build of Keycloakorg.apache.activemq/artemis-cliNot affected
Red Hat Fuse 7org.apache.activemq/artemis-cliWill not fix
Red Hat JBoss Enterprise Application Platform 7artemis-cliNot affected
Red Hat JBoss Enterprise Application Platform 8artemis-cliNot affected
Red Hat JBoss Enterprise Application Platform Expansion Packartemis-cliNot affected
Red Hat Single Sign-On 7org.apache.activemq/artemis-cliNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-285
https://bugzilla.redhat.com/show_bug.cgi?id=2318571artemis: Apache ActiveMQ Artemis: Authenticated users could perform RCE via Jolokia MBeans

EPSS

Процентиль: 86%
0.02713
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
больше 1 года назад

Apache ActiveMQ Artemis allows access to diagnostic information and controls through MBeans, which are also exposed through the authenticated Jolokia endpoint. Before version 2.29.0, this also included the Log4J2 MBean. This MBean is not meant for exposure to non-administrative users. This could eventually allow an authenticated attacker to write arbitrary files to the filesystem and indirectly achieve RCE. Users are recommended to upgrade to version 2.29.0 or later, which fixes the issue.

CVSS3: 8.8
github
больше 1 года назад

Apache ActiveMQ Artemis: Authenticated users could perform RCE via Jolokia MBeans

CVSS3: 8.8
fstec
около 2 лет назад

Уязвимость компонента Jolokia Endpoint программной платформы Apache ActiveMQ Artemis, позволяющая нарушителю записывать произвольные файлы

EPSS

Процентиль: 86%
0.02713
Низкий

8.8 High

CVSS3